Cryptography for Resource Constrained Devices: A Survey

Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 11

Abstract

Specifically designed and developed cryptographic algorithms, which are suitable for implementation in resource constrained devices such as RFID systems, smart cards and wireless sensor networks are called light weight cryptographic algorithms. In this paper a survey is done on the selected light weight cryptographic algorithms. The light weight cryptographic algorithms are of two types, block ciphers and stream ciphers. Algorithms under both these categories are presented in this paper. Security features and performances of hardware implementations of these algorithms are also analyzed.

Authors and Affiliations

Jacob John

Keywords

Related Articles

PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH

In this paper, we propose a novel approach “Routing based on Best First Search Technique (RBFS)” to improve the erformance of Dynamic Source Routing (DSR) for mobile d-hoc wireless networks. The proposed scheme tries t...

A Genetic Algorithm Optimized Decision Tree- SVM based Stock Market Trend Prediction System

Prediction of stock market trends has been an area of great interest both to researchers attempting to uncover the information hidden in the stock market data and for those who wish to profit by trading stocks. The extre...

Design and Development of Result Tool for University and College Exam and it’s Performance Study

The result system tool is designed and developed for result sheet and mark sheet preparation with various report required at University level and College level. The system is useful for the exam department of the institu...

Problem Analysis of Routing Protocols in MANET in Constrained Situation

A Mobile Ad-hoc network (MANET) consists of a number of mobile wireless nodes, among which the communication is carried out without having any centralized control. MANET is a self organized, self configurable network hav...

HUNTING DOWN UNDO ISSUES WITH ORACLE: A PRACTICAL APPROACH

This article discusses the challenges in managing UNDO data and several practical approaches one might follow while analyzing and resolving UNDO issues. The most frequent UNDO error: ORA-01555 snapshot-too-old error is d...

Download PDF file
  • EP ID EP161322
  • DOI -
  • Views 124
  • Downloads 0

How To Cite

Jacob John (2012). Cryptography for Resource Constrained Devices: A Survey. International Journal on Computer Science and Engineering, 4(11), 1766-1770. https://europub.co.uk/articles/-A-161322